{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3237","assignerOrgId":"6f4f8c89-ef06-4bae-a2a5-6734ddf76272","state":"PUBLISHED","assignerShortName":"Octopus","dateReserved":"2026-02-26T00:26:01.068Z","datePublished":"2026-03-17T06:37:59.369Z","dateUpdated":"2026-03-17T13:20:24.029Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6f4f8c89-ef06-4bae-a2a5-6734ddf76272","shortName":"Octopus","dateUpdated":"2026-03-17T06:37:59.369Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"Low-Privilege User Can Modify Global Signing Key Settings"}]}],"affected":[{"vendor":"Octopus Deploy","product":"Octopus Server","platforms":["Windows"],"versions":[{"status":"affected","version":"2023.0.0","lessThan":"2025.3.14731","versionType":"custom"},{"status":"affected","version":"2025.4.0","lessThan":"2025.4.10359","versionType":"custom"},{"status":"affected","version":"2026.1.0","lessThan":"2026.1.5571","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"In affected versions of Octopus Server it was possible for a low privileged user to manipulate an API request to change the signing key expiration and revocation time frames via an API endpoint that had incorrect permission validation. It was not possible to expose the signing keys using this vulnerability.","supportingMedia":[{"type":"text/html","base64":false,"value":"In affected versions of Octopus Server it was possible for a low privileged user to manipulate an API request to change the signing key expiration and revocation time frames via an API endpoint that had incorrect permission validation. It was not possible to expose the signing keys using this vulnerability."}]}],"references":[{"url":"https://advisories.octopus.com/post/2026/sa2026-03"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"LOW","baseScore":2.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"}}],"credits":[{"lang":"en","value":"This vulnerability was found by raihanadiarba","type":"finder"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-285","lang":"en","description":"CWE-285 Improper Authorization"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-17T13:20:19.497726Z","id":"CVE-2026-3237","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-17T13:20:24.029Z"}}]}}